{"id":4001,"date":"2015-01-08T00:21:29","date_gmt":"2015-01-08T03:21:29","guid":{"rendered":"https:\/\/www.kwell.net\/kwell_blog\/?p=4001"},"modified":"2015-01-05T20:27:14","modified_gmt":"2015-01-05T23:27:14","slug":"hacker-clona-la-huella-dactilar-del-ministro-de-defensa-aleman","status":"publish","type":"post","link":"https:\/\/www.kwell.net\/kwell_blog\/?p=4001","title":{"rendered":"Hacker clona la huella dactilar del ministro de defensa alem\u00e1n"},"content":{"rendered":"<p><a href=\"https:\/\/i0.wp.com\/4.bp.blogspot.com\/-5T3Qk5-c-c4\/VKKEVwInIMI\/AAAAAAAAhVM\/tzL2dXG1d_I\/s1600\/clone-fingerprint-scanner.jpg\" rel=\"nofollow\"><img decoding=\"async\" loading=\"lazy\" title=\"Hacker Clones German Defense Minister's Fingerprint Using Just her Photos\" src=\"https:\/\/i0.wp.com\/4.bp.blogspot.com\/-5T3Qk5-c-c4\/VKKEVwInIMI\/AAAAAAAAhVM\/tzL2dXG1d_I\/s728\/clone-fingerprint-scanner.jpg?resize=427%2C231\" alt=\"Hacker Clones German Defense Minister's Fingerprint Using Just her Photos\" width=\"427\" height=\"231\" border=\"0\" data-recalc-dims=\"1\" \/><\/a>Hackers have already bypassed Apple&#8217;s <a href=\"http:\/\/thehackernews.com\/2013\/09\/finally-iphones-fingerprint-scanner.html\" target=\"_blank\"><strong><span style=\"color: #3d5a99;\">fingerprint scanner<\/span><\/strong><\/a> using fake fingerprints, and now they have found a way to reproduce your fingerprints by using just a couple of photos of your fingers.<\/p>\n<div>Special Fingerprint sensors have already been used by Apple and Samsung in their smartphones for authentication purposes and in near future fingerprints sensors are believed to be the part of plenty of other locked devices that can be unlocked using fingerprints, just to add an extra layer of authentication. But, <b>How secure are your fingerprints?<\/b><\/div>\n<p><!--more--><\/p>\n<div>A member of Europe&#8217;s oldest hacker collective, the <i>Chaos Computer Club (CCC)<\/i>, claimed to have cloned a fingerprint of a <b>Germany&#8217;s federal minister of defense<\/b><i>,<\/i><b> Ursula von der Leyen<\/b><i>,<\/i> using pictures taken with a <i>&#8220;<b>standard photo camera<\/b>&#8220;<\/i> at a news conference.<\/div>\n<div><\/div>\n<div id=\"insidearticlead\"><!-- Banner inside article -->At the <b>31st annual Chaos Computer Conference<\/b> in Hamburg Germany this weekend, biometrics researcher <b>Starbug<\/b>, whose real name is <b>Jan Krissler<\/b>, explained that he used a close-up photo of <i>Ms von der Leyen&#8217;s thumb<\/i> that was taken with a &#8220;standard photo camera&#8221; at a presentation in October &#8212; standing nine feet (3 meters) away from the official. He also used several other pictures of her thumb taken at different angles.<\/div>\n<div id=\"aim26792870012899990640\">\n<div><\/div>\n<div>Starbug then used a publicly available software program called <b>VeriFinger<\/b> with photos of the finger taken from different angles to recreate an accurate thumbprint. According to CCC, this software is good enough to fool fingerprint security systems.<\/div>\n<div>\n<blockquote class=\"tr_bq\"><p>&#8220;After this talk, politicians will presumably wear gloves when talking in public,&#8221; Starbug <a href=\"http:\/\/www.ccc.de\/en\/updates\/2014\/ursel\" target=\"_blank\" rel=\"nofollow\"><strong><span style=\"color: #3d5a99;\">told<\/span><\/strong><\/a> the audience at the <i>Chaos Computer Conference (CCC) conference<\/i>.<\/p><\/blockquote>\n<\/div>\n<div>However, this is not the very first time when Chao Computer Club has targeted fingerprints. In past, the group has demonstrated how easily the <a href=\"http:\/\/thehackernews.com\/2013\/09\/iphone-5s-users-fooled-by-apple-nsa-and.html\" target=\"_blank\"><strong><span style=\"color: #3d5a99;\">Apple iPhone 5s<\/span><\/strong><\/a> can be unlocked using a fake fingerprint obtained from an individual who has touched a shiny surface, such as glass or a smartphone screen.<\/div>\n<div>\n<blockquote class=\"tr_bq\"><p>&#8220;This demonstrates\u2014again\u2014that fingerprint biometrics is unsuitable as [an] access control method and should be avoided,&#8221; the group <a href=\"http:\/\/www.ccc.de\/en\/updates\/2013\/ccc-breaks-apple-touchid\" target=\"_blank\" rel=\"nofollow\"><strong><span style=\"color: #3d5a99;\">said<\/span><\/strong><\/a> at the time.<\/p><\/blockquote>\n<\/div>\n<div>Moreover, just three days after the launch of the Galaxy S5, hackers successfully managed to hack <a href=\"http:\/\/thehackernews.com\/2014\/04\/Samsung-Galaxy-S5-Fingerprint-Scanner-Hacked.html\" target=\"_blank\"><strong><span style=\"color: #3d5a99;\">Galaxy S5 Fingerprint sensor<\/span><\/strong><\/a> using a similar method that was used to spoof the <a href=\"http:\/\/thehackernews.com\/2013\/09\/finally-iphones-fingerprint-scanner.html\" target=\"_blank\"><strong><span style=\"color: #3d5a99;\">Touch ID sensor<\/span><\/strong><\/a> on the iPhone 5S.<\/div>\n<div><\/div>\n<div>But this recent hack did not require any object &#8216;carrying the fingerprints anymore,&#8217; which means that any person could potentially steal someone&#8217;s fingerprint identity from photos posed on Facebook, Twitter or any social networking site.<\/div>\n<div><\/div>\n<div>This new finding by Starbug potentially calls into question the effectiveness of fingerprint scanners as a security measure. Fingerprints have been supported in the past as biometric identifiers, but because it can be easily reproduced, using fingerprints for security purposes raises questions.<\/div>\n<div><\/div>\n<div>The practical danger is low, because even after obtaining your fingerprint, the data thieves would still need to have your devices or otherwise find a way to sign in using your biometric information. But, the concern is more as the method require no technical skill to perform the fingerprint cloning.<\/div>\n<\/div>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Comparte esto:<\/h3><div class=\"sd-content\"><ul><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-4001\" class=\"share-facebook sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=4001&amp;share=facebook\" target=\"_blank\" title=\"Haz clic para compartir en Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-4001\" class=\"share-twitter sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=4001&amp;share=twitter\" target=\"_blank\" title=\"Haz clic para compartir en Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BEntrada%20compartida%5D%20Hacker%20clona%20la%20huella%20dactilar%20del%20ministro%20de%20defensa%20alem%C3%A1n&body=https%3A%2F%2Fwww.kwell.net%2Fkwell_blog%2F%3Fp%3D4001&share=email\" target=\"_blank\" title=\"Haz clic para enviar un enlace por correo electr\u00f3nico a un amigo\" data-email-share-error-title=\"\u00bfTienes un correo electr\u00f3nico configurado?\" data-email-share-error-text=\"Si tienes problemas al compartir por correo electr\u00f3nico, es posible que sea porque no tengas un correo electr\u00f3nico configurado en tu navegador. Puede que tengas que crear un nuevo correo electr\u00f3nico t\u00fa mismo.\" data-email-share-nonce=\"dbd58788e3\" data-email-share-track-url=\"https:\/\/www.kwell.net\/kwell_blog\/?p=4001&amp;share=email\"><span>Correo electr\u00f3nico<\/span><\/a><\/li><li class=\"share-jetpack-whatsapp\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-jetpack-whatsapp sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=4001&amp;share=jetpack-whatsapp\" target=\"_blank\" title=\"Haz clic para compartir en WhatsApp\" ><span>WhatsApp<\/span><\/a><\/li><li class=\"share-skype\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-skype-4001\" class=\"share-skype sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=4001&amp;share=skype\" target=\"_blank\" title=\"Haz clic para compartir en Skype\" ><span>Skype<\/span><\/a><\/li><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=4001\" target=\"_blank\" title=\"Haz clic para imprimir\" ><span>Imprimir<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-4001\" class=\"share-linkedin sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=4001&amp;share=linkedin\" target=\"_blank\" title=\"Haz clic para compartir en LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Hackers have already bypassed Apple&#8217;s fingerprint scanner using fake fingerprints, and now they have found a way to reproduce your fingerprints by using just a couple of photos of your fingers. Special Fingerprint sensors have already been used by Apple and Samsung in their smartphones for authentication purposes and in near future fingerprints sensors are &hellip;<br \/><a href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=4001\">Read more <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Comparte esto:<\/h3><div class=\"sd-content\"><ul><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-4001\" class=\"share-facebook sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=4001&amp;share=facebook\" target=\"_blank\" title=\"Haz clic para compartir en Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-4001\" class=\"share-twitter sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=4001&amp;share=twitter\" target=\"_blank\" title=\"Haz clic para compartir en Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BEntrada%20compartida%5D%20Hacker%20clona%20la%20huella%20dactilar%20del%20ministro%20de%20defensa%20alem%C3%A1n&body=https%3A%2F%2Fwww.kwell.net%2Fkwell_blog%2F%3Fp%3D4001&share=email\" target=\"_blank\" title=\"Haz clic para enviar un enlace por correo electr\u00f3nico a un amigo\" data-email-share-error-title=\"\u00bfTienes un correo electr\u00f3nico configurado?\" data-email-share-error-text=\"Si tienes problemas al compartir por correo electr\u00f3nico, es posible que sea porque no tengas un correo electr\u00f3nico configurado en tu navegador. Puede que tengas que crear un nuevo correo electr\u00f3nico t\u00fa mismo.\" data-email-share-nonce=\"dbd58788e3\" data-email-share-track-url=\"https:\/\/www.kwell.net\/kwell_blog\/?p=4001&amp;share=email\"><span>Correo electr\u00f3nico<\/span><\/a><\/li><li class=\"share-jetpack-whatsapp\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-jetpack-whatsapp sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=4001&amp;share=jetpack-whatsapp\" target=\"_blank\" title=\"Haz clic para compartir en WhatsApp\" ><span>WhatsApp<\/span><\/a><\/li><li class=\"share-skype\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-skype-4001\" class=\"share-skype sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=4001&amp;share=skype\" target=\"_blank\" title=\"Haz clic para compartir en Skype\" ><span>Skype<\/span><\/a><\/li><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=4001\" target=\"_blank\" title=\"Haz clic para imprimir\" ><span>Imprimir<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-4001\" class=\"share-linkedin sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=4001&amp;share=linkedin\" target=\"_blank\" title=\"Haz clic para compartir en LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[1],"tags":[19,133],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/posts\/4001"}],"collection":[{"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4001"}],"version-history":[{"count":1,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/posts\/4001\/revisions"}],"predecessor-version":[{"id":4002,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/posts\/4001\/revisions\/4002"}],"wp:attachment":[{"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4001"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}